Offensive Security’s Exploit Database Archive

The Exploit Database – ultimate archive of Exploits, Shellcode, and Security Papers. New to the site? Learn about the Exploit Database.

0

Exploits Archived

The Exploit Database

CVE Compliant

The Exploit Database (EDB) is a CVE compliant archive of exploits and vulnerable software. A great resource for penetration testers, vulnerability researchers, and security addicts alike. Our goal is to collect exploits from various sources and concentrate them in one, easy to navigate databaseDownload the Exploit Database Archive

Google Hacking Database

The Google Hacking Database (GHDB) is a collection of interesting Google searches which find, identify or expose information which could be useful for penetration testers or security auditors such as advertised vulnerabilities, exposed credentials and more. Visit the Google Hacking Database

Offline Search

Using our GitHub repository and off-line search tool, "searchsploit", you can take a copy of the Exploit Database with you everywhere you go, allowing you to perform detailed off-line searches through your locally checked-out copy of the repository.Learn More About SearchSploit